#zetter
Explore tagged Tumblr posts
multicolour-ink ¡ 2 years ago
Text
Tumblr media
@the-absolute-worst Ask and you shall receive :)
Ok so this was a hard one for me to do because you only get 10 answers and most of the characters in this DLC you already meet in xc2, so I opted to list characters that are purely in TtGC only
9 notes ¡ View notes
artsculturevienna ¡ 2 years ago
Photo
Tumblr media
Oskar LASKE (1874-1951) “Das Tierparadies, Opus 70” (1930) - “Animal Paradise, Opus 70” (1930) Öl, Tempera auf Leinwand / Oil, Tempera on canvas Privatsammlung Österreich / Private collection, courtesy Galerie Kovacek & Zetter Ausstellung / Exhibition HAGENBUND - Von der gemäßigten zur radikalen Moderne HAGENBUND - From moderate to radical Modernism LEOPOLD MUSEUM Wien / Vienna - 2022/23
7 notes ¡ View notes
ami8666 ¡ 26 days ago
Text
Tumblr media
Love this poem...
0 notes
romanoschmid ¡ 1 year ago
Text
Tumblr media
0 notes
actuallyacryiptid ¡ 4 days ago
Note
Can you draw alien Roper
Before any of you say anything, I absolutely had to color him as bright as possible
Tumblr media
Zook, zou zetter zet zp zhere, zhe zoss zan zounds zaging
25 notes ¡ View notes
jiminy-crickets ¡ 11 days ago
Text
zetter i still love you okay baby?! okay!!!
7 notes ¡ View notes
teletogami ¡ 1 year ago
Text
tag thingy so fun
I was tagged by @stoneocean2011 ⚡️⚡️
last song: the lobotomy by maebi
last movie: Oppenheimer
currently watching: (I don’t really watch tv, so most recently was 5 months ago and it was-) LOST
currently reading: countdown to zero day by kim zetter
currently craving: not being nauseous
last thing you researched: DNS cache poisoning
do I even know 9 people to tag okay let’s see
@thebusytypewriter @celamoon @tieressian @daveth-isnt-dead @ultimateluckystudent-writes @whorkn33 @weemopuu @anniean-not @simp4bakuh03
42 notes ¡ View notes
catalogue-of-lux-feli ¡ 6 months ago
Text
A World of Possibilities, and All of Them Yours!
AV External Instant Messaging System status for user LuxF: Active AV External Instant Messaging System status for user AshwringerCustomerRelations: Inactive
Thank you for your inquiries!
--__--__--__--
OOC Welcome to The Catalogue of Lux Feli! This is an interactive story chronicling the (mis)adventures of the titular protagonist in an unfamiliar world. The majority of the story will be told via text accompanied by gameplay screenshots, though the occasional drawing or post in an alternate medium may appear.
Please feel free to send in asks, plot relevant or otherwise! Asks will be answered by Lux by default, unless the ask is specifically addressed otherwise.
Inspired by @for-quill-with-love :D
Disclaimers: -I am one person, I am not taking this too seriously, and I can be very absent minded. Plot holes are likely, if not inevitable. Don't worry, it just means the story comes with extra pockets. -Cursing and mentions of/mild descriptions of (mostly cartoonish) violence are likely. They will not be ever-present, but they most likely will appear in some posts. I will be keeping it at about a PG-13 level, with the possible exception of the limits on swearing that will imply, though this 'limit' will be broken sparingly. -I cannot guarantee all asks will be answered, but if not all are, most will be. -I am playing with mods, though some will be used far more extensively than others. -Be careful what you tell Lux, lest he be led astray…. >:)
Archive link: o0o0o
Mod info, tag list, and additional notes below the cut!
Modded using Forge. Mod Launcher: Modrinth Mods Used (including framework mods): AppleSkin Balm Bedspreads Cat Loaf Clumps Comforts Create Decorative Blocks Easy As Pie Embeddium* Entity Culling Falling Leaves Farmer's Delight Crate Delight Fruits Delight Freecam Gardener's Dream Geckolib Jade Just Enough Items Lucky Clover! Macaw's Bridges Macaw's Doors Macaw's Fences and Walls Macaw's Furniture Macaw's Lights and Lamps Macaw's Paintings Macaw's Paths and Pavings Macaw's Roofs Macaw's Trapdoors Macaw's Windows Mystic's Biomes Naturalist TerraBlender Waystones Xaero's Minimap YDM's Fennec Fox YDM's Red Panda Zetter -- Painting Mod
[*] replaced rubidium due to a bug
Blog tags:
-#ooc chatter - The out of character tag for the blog. Anything tagged with this is meant to not be taken as part of the story.
-#worlds somnambulance project - Story tag. Anything tagged with this IS part of the story.
-#words from lux - The main tag for Lux answering messages.
-#a message from ashwringer ventures - Any answered asks or input from Ashwringer Ventures Inc. or a representative thereof will be tagged with this.
-#broadcast [#] - A tag for chronology tracking. Main posts will be tagged this way, in numerical order.
-#broadcast [#.#] - A tag for chronology tracking. Posts answering asks or otherwise considered "in between" main/gameplay posts will be tagged this way, with the first number being the number of the gameplay post prior, and the second number ordering the posts since the prior gameplay post numerically.
A note on tags: by default, all tags are ooc - including and especially 'talking tags'. If I have ooc thoughts to share, they'll often be in the tags. A note on the blog runner: if I drop off the face of the earth, do not worry. It may be that my sense of object permanence has ceased working on this blog. Hopefully temporarily.
16 notes ¡ View notes
dru-reblogs-stuff ¡ 9 months ago
Text
Get to know you tag
Yoinking an open tag from @blind-the-winds because it's been a hot minute since I've done one of these.
last song:
On the Railroad, performed by Colm McGuinness. It's a work song about building the First Transcontinental Railroad from Nebraska to San Francisco Bay. I'm particularly attached to this song, because it reminds me of when I traveled that route.
favorite color:
Let's go with 'vibrant rainbow' because I'm not really having an strong favourite colour at the moment. The Gent sent me a bouquet of pinks and purples and whites. The crocuses in the balcony are mostly yellow. The Housemate made some lego roses which are deep red. Everything else is shades of green, and the show I'm watching is filled with cyber blue.
currently reading:
Red Team Blues by Cory Doctorow. A very interesting story about an older forensic accountant who gets wrapped up in mafia wars to do with moving money through cryptocurrency. I'm learning a lot from it which I can use in Haven's Ember.
Countdown to Zero Day by Kim Zetter and Count Zero by William Gibson are on the backburner for now.
sweet, spicy, or savoury:
Sweet. I've had a really bad craving for ice cream for the past few days. I'm blaming how terrible the weather is.
last thing i searched online:
"green vegetables that start with a P" - On the way to my mum's yesterday we were talking about the sorts of things one can put in SpagBol, and Mum couldn't remember the name of a vegetable: "it begins with P" and I couldn't remember any veg names so I turned to the internet for help.
The vegetable she was thinking of was sPinach.
current obsession:
I've got a couple of things on the go, but none of them are really obsessions?
I'm editing a fanfic AU from 2017, which is bringing back ~emotions~. But it's also slowly getting posted on my main blog
I'm thinking about the next art project I want to do
I've been binge-watching my way through The Expanse which is awesome. I've not had a good space opera fix in a while (not counting Space Opera by Catherynne M. Valente which I read over xmas and was very fun)
Open tag! Tag me back if you yoink it so I can read all about you :D
4 notes ¡ View notes
spiderman616 ¡ 1 year ago
Note
zouldn't zt ze zun zf zhe zirst zetter zf zvery zord zas z z?
explode
7 notes ¡ View notes
jazz-kity ¡ 1 year ago
Text
Tumblr media Tumblr media Tumblr media
poor fuckin zetters man
3 notes ¡ View notes
artsculturevienna ¡ 2 years ago
Photo
Tumblr media
Ludwig Heinrich JUNGNICKEL (1881-1965) “Buchenwald” - “Beech Forest” (1907) Öl auf Leinwand / Oil on Canvas Galerie bei der Albertina - ZETTER, Wien Ausstellung / Exhibition HAGENBUND - Von der gemäßigten zur radikalen Moderne HAGENBUND - From moderate to radical Modernism LEOPOLD MUSEUM Wien / Vienna - 2022/23
10 notes ¡ View notes
mariacallous ¡ 2 years ago
Text
Ransomware gangs have long sought pain points where their extortion demands have the greatest leverage. Now an investigation from NBC News has made clear what that merciless business model looks like when it targets kids: One ransomware group's giant leak of sensitive files from the Minneapolis school system exposes thousands of children at their most vulnerable, complete with behavioral and psychological reports on individual students and highly sensitive documentation of cases where they've allegedly been abused by teachers and staff.
We'll get to that. But first, WIRED contributor Kim Zetter broke the news this week that the Russian hackers who carried out the notorious SolarWinds espionage operation were detected in the US Department of Justice's network six months earlier than previously reported—but the DOJ didn't realize the full scale of the hacking campaign that would later be revealed. 
Meanwhile, WIRED reporter Lily Hay Newman was at the RSA cybersecurity conference in San Francisco, where she brought us stories of how security researchers disrupted the operators of the Gootloader malware who sold access to victims' networks to ransomware groups and other cybercriminals, and how Google Cloud partnered with Intel to hunt for and fix serious security vulnerabilities that underlie critical cloud servers. She also captured a warning in a talk from NSA cybersecurity director Rob Joyce, who told the cybersecurity industry to "buckle up" and prepare for big changes to come from AI tools like ChatGPT, which will no doubt be wielded by both attackers and defenders alike.
On that same looming AI issue, we looked at how the deepfakes enabled by tools like ChatGPT, Midjourney, DALL-E, and StableDiffusion will have far-reaching political consequences. We examined a newly introduced US bill that would ban kids under the age of 13 from joining social media. We tried out the new feature in Google's Authenticator App that allows you to back up your two-factor codes to a Google account in case you lose your 2FA device. And we opined—well, ranted—on the ever-growing sprawl of silly names that the cybersecurity industry gives to hacker groups.
But that’s not all. Each week, we round up the news we didn’t report in-depth ourselves. Click on the headlines to read the full stories. And stay safe out there.
Inside a Ransomware Dump of a School’s Student Records
What happens when a school system is targeted by a ransomware group, refuses to pay, and thus gets their stolen data dumped wholesale onto the dark web? Well, it's even worse than it sounds, as NBC's Kevin Collier found this week when he dug through portions of a trove of 200,000 files leaked online after the Minneapolis public school system was hit by hackers earlier this year. 
The leaked files include detailed dossiers linking children by name, birth date, and address to a laundry list of highly private information: their special needs, their psychological profiles and behavioral analyses, their medications, the results of intelligence tests, and which kids' parents have divorced, among many other sensitive secrets. In some cases, the files even note which children have been victims of alleged abuse by school teachers or staff. The hackers also took special pains to publicly promote their toxic dump of children's information, with links posted to social media sites and a video showing off the files and instructing viewers how to download them.
The Minneapolis school system is offering free credit monitoring to parents and children affected by the data dump. But given the radioactive nature of the personal information released by the hackers, identity fraud may be the least of their victims' worries.
Cyber Command Disrupted Iranians Hacking a US Elections Website
In a rare declassified disclosure at a panel at this week's RSA Conference, General William Hartman revealed that US Cyber Command had disrupted an Iranian hacking operation that targeted a local elections website ahead of the 2020 election. According to Hartman, who leads Cyber Command's National Mission Force, the intrusion couldn't have affected actual vote counts or voting machines, but—had Cyber Command's own hackers not kiboshed the operation—might have potentially been used to post false results as part of a disinformation effort. 
Hartman named the Iranian hackers as a group known as Pioneer Kitten, also sometimes referred to as UNC757 or Parisite, but didn't name the specific elections website that they targeted. Hartman added that the hacking operation was found thanks to Cyber Command's Hunt Forward operations, in which it hacks foreign networks to preemptively discover and disrupt adversaries who target the US.
Instagram and Facebook Remain Rife With Child Sex Traffickers
Following a two-year investigation, The Guardian this week published a harrowing exposÊ on Facebook and Instagram's use as hunting grounds for child predators, many of whom traffic in children as sexual abuse victims for money on the two social media services. Despite the claims of the services' parent company Meta that it's closely monitoring its services for child sexual abuse materials or sexual trafficking, The Guardian found horrific cases of children whose accounts were hijacked by traffickers and used to advertise them for sexual victimization. 
One prosecutor who spoke to The Guardian said that he'd seen child trafficking crimes on social media sites increase by about 30 percent each year from 2019 to 2022. Many of the victims were as young as 11 or 12 years old, and most were Black, Latinx, or LGBTQ+.
Hackers Are Hijacking AT&T Email Accounts to Steal Cryptocurrency
A group of hackers has been taking over AT&T email accounts—the telecom provider runs email domains including att.net, sbcglobal.net, bellsouth.net—to hack their cryptocurrency wallets, TechCrunch reports. 
A tipster tells TechCrunch that the hackers have access to a part of AT&T's internal network that allows them to generate "mail keys" that are used to offer access to an email inbox via email applications like Thunderbird or Outlook. The hackers then use that access to reset the victims' passwords on cryptocurrency wallet services like Gemini and Coinbase, and, according to TechCrunch's source, have already amassed between $10 million and $15 million in stolen crypto, though TechCrunch couldn't verify those numbers.
5 notes ¡ View notes
distinktionsfetzen ¡ 14 days ago
Photo
Tumblr media
Check out Josef Mikl, Two with Blue Puppet (2006-2007), From Galerie Bei Der Albertina Zetter
0 notes
dogopower ¡ 3 months ago
Text
The nations, of course, that are most at risk of a destructive digital attack are the ones with the greatest connectivity. Marcus Ranum, one of the early innovators of the computer firewall, called Stuxnet 'a stone thrown by people who live in a glass house'.
Kim Zetter, Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon
0 notes
govindhtech ¡ 3 months ago
Text
mWISE Conference 2024: See Future Of Cybersecurity
Tumblr media
The field of cybersecurity is always changing, and using collective intelligence to remain ahead of the curve is essential. The mWISE Conference 2024 offers you the opportunity to interact with the visionary thinkers influencing the future of cybersecurity and immerse yourself in the most recent threat intelligence and Cutting-Edge Technology
mWISE Conference 2024 is a three-year-old program that was specifically created by the security community for the security community. Attendees will share information, get insight from personal experiences, and view the most recent, tried-and-true solutions that are assisting organisations in fending off significant threats throughout the two-day event, which is vendor-neutral.
On September 18–19, at mWISE in Denver, Colorado, experts from Mandiant, Google Cloud, and the larger cybersecurity community will convene.
The keynote address: Expert perspectives
Feature the most recent information from luminaries and pioneers in security on keynote stage.
Kevin Mandia
The first day of the conference begins with statements from Google Cloud strategic security advisor Kevin Mandia. The threat environment and how organisations should secure their most valuable assets will be covered tactically.
Jen Easterly
What worries the Cybersecurity and Infrastructure Security Agency? CISA director Jen Easterly discusses the biggest cybersecurity issues on day two.
The growing cash cow of cyberspace
Groups and their affiliates are still being driven to increase operations and make additional investments in their businesses by the profitability of ransomware. Experts in cybercrime Brett Callow of FTI Consulting, Kimberly Goody of Mandiant, and Allan Liska of Recorded Future talk about the most recent data and trends surrounding ransomware, including a rise in aggressive extortion tactics, and how businesses may better protect themselves against and handle threats. Journalist Kim Zetter, an expert in cybersecurity and national security, will moderate the panel.
Defending against complex threats
Firsthand observations Mandiant Consulting’s CTO, Charles Carmakal, leads a mainstage conversation with seasoned business executives who have guided their companies through well-publicized cybersecurity incidents. Discover how cybersecurity leadership is changing in-depth, with insights that can be applied by professionals of all stripes.
John Hultquist
Leaders need to employ dynamic, frontline intelligence in the current threat scenario in order to anticipate changing enemies. John Hultquist, chief analyst at Mandiant Intelligence, examines the most recent front-line findings and solutions for the most pressing threats in a fireside chat.
What will they know when AI becomes intelligent?
Author and researcher David Eagleman analyses how artificial intelligence may surpass human intelligence and how google cloud might forecast it.
Large sessions: Dive deeply into the crucial cybersecurity problems of the day
Over 70 presentations covering nine tracks Cloud Security, Threat Intelligence, the Intersection of AI and Cybersecurity, Next Gen CISO, Security Engineering, Security Operations, Security Threats and Exploits are offered at this year’s mWISE Conference 2024. We’ve picked a few sessions to highlight here to pique your interest
How generative AI changes defense
Leaders in Google Cloud Security Steph Hay and Umesh Shankar explain macro trends at the nexus of security and AI and what they represent for your company using insights from talks with CISOs, the most recent Mandiant research, and Google DeepMind breakthroughs.
North Korean-backed threat actor goes from job interview to bitcoin heist
Clearing a job interview is the first step towards an insider bitcoin theft. Listen as Mandiant Senior Consultants Yi Han Ang and Sun Pu reveal a highly skilled cyber-espionage operation that was launched against a cryptocurrency corporation by a North Korean threat actor. They intend to talk about how crucial it is to put in place thorough security measures in the cloud in order to lessen the likelihood of assaults like this one.
Generative AI-era secure remote identity verification
In the age of generative AI, secure remote identity verification Science-based biometrics-as-a-service can prevent deepfake assaults by enabling dependable, simple-to-manage remote identification for employees and customers. The CEO and creator of iProov, Andrew Bud, discusses the difficulties in implementing remote identity throughout the company and offers customer best practices in this presentation.
The supply-chain attack summer taught us
In the summer of 2023, there were an unprecedented amount of supply chain attacks. Key issues like legal exposure, cyber reporting, and handling threats to company officials or their families will be covered by Erin Joe (Google Cloud Office of the CISO), Lyn Brown and Megan Brown (Wiley Rein), and Jennifer Burnside (Crisis Communications for Google Cloud Security). They will also share lessons learnt and talk about emerging trends.
Construct a low-cost, high-value quantitative risk management program
Tim Anderson and Matthew Harding of ID.me have provided a systematic guide to implementing quantitative risk management. Find out how to report and communicate risk from the boardroom to the security team room. The application and operation of quantitative program design using people, procedures, and technology will be covered.
The cloud security dilemma Unsecure use, safe cloud
Cloud service providers make significant investments in security, far more than what most businesses could accomplish on their own. But leaks and breaches in the cloud dominate the headlines. Why is that? In actuality, cloud security is a shared opportunity as much as a shared obligation. Google Cloud‘s Anton Chuvakin explores this somewhat perplexing conundrum in this session.
Opportunities for networking: Establishing your cybersecurity community
Building a network that can help you in your profession and interacting with peers to gain knowledge from their experiences are all important aspects of mWISE Conference 2024. Make the most of the many breakout sessions, social events, and networking opportunities to establish meaningful relationships.
Among these chances is a special Capture the Flag challenge where you may put your cybersecurity prowess to the test. This CTF game simulates a threat hunt using real-world information from ransom notes, the dark web, and CISA advisories. Using a new Google Threat Intelligence product, follow the clues, evaluate the evidence, and work through the puzzles to identify the flags.
On September 18–19 in Denver, Colorado, They look forward to building Google defender’s community and sharing their most recent security findings with you.
Read more on govindhtech.com
1 note ¡ View note